Joint training method and device for service model
A business model and training method technology, applied in the computer field, can solve problems such as incomplete data sharing and data islands
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The solutions provided in this specification will be described below in conjunction with the accompanying drawings. The technical terms involved in the embodiments of this specification are introduced below.
[0054] Multi-Party Computation (Secure Muti-Party Computation, MPC) is an algorithm that protects data privacy and security. Multi-party secure computing allows multiple data parties participating in the calculation to perform collaborative calculations without leaking their own data.
[0055] Secret Sharing (SS) is an algorithm for protecting data privacy. Under the premise of not leaking their own data, multiple data parties can use the secret sharing method to perform collaborative calculations and obtain secret information. Each data party can obtain a share of this secret information. A single data party cannot recover this secret information. This secret information can only be recovered by fusing the shares owned by multiple data parties. For example, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com